network security
Across
- 2. intrusive software created to steal data and destroy or damage computers/systems
- 3. malicious software that gathers data about the user and forwards to a third party.
- 6. This attack occurs when someone pretends to be something that they are not.
- 8. This type of attack tries to alter system resources or affect their operations
- 9. emails that are sent pretending to be from companies asking for personal information.
- 10. this is used to hide the information content of data
Down
- 1. prevents normal use of communication or disrupts the network
- 4. a flaw or weakness used to attack a system or organization
- 5. makes use of information but does not affect system resources
- 7. someone who violates computer security